New Random Generator of a Safe Cryptographic Salt Per Session
نویسندگان
چکیده
Nowadays, client authentication in Web applications for each user based on passwords and a statically salts [11, 13, 18, 19]. The aim of this article is to propose random generator of a safe cryptographic salt per session (RGSCS). The interest to introduce this regenerator is to contribute to the evolution of the cryptographic quality of the systems of strong zero knowledge authentication based on passwords. In Section 3, we propose a model for regeneration a SOTS based on random functions and on CRC code. To study the behavior of the RGSCS, which is the objective of Section 4, we have, in one hand, defined and proved a metric on the finite set of periodic binary sequences not necessarily the same period, the uncorrelation, the impact of the distribution of lengths and the unpredictability of primitive signals and in the other hand, evaluated the performance of our purpose by using several tests. The outcome showed that RGSCS has a chaotic behavior. As for Section 5, is devoted to the implementation of our RGSCS algorithm under PHP5. This article is finished by a conclusion.
منابع مشابه
Design and Analysis of /dev/random, a Pseudorandom Number Generator
The ability to produce random numbers is an important aspect of many cryptographic applications. This document examines a method of constructing an algorithm that behaves in a non-deterministic manner in order to produce unpredictable outputs. Specifically, this paper examines the design of the pseudo random number generator /dev/random. 1 PRNG’s and the importance of randomness In many cryptog...
متن کاملA Novel Approach for Pseudo-Random Seed Generation
Random sequences play an important role in all aspects of Cryptography. All cryptographic systems and protocols are based on secrets and can only be as strong as the random sequence generators they use to generate those secrets. The best cryptographic scheme becomes insecure once its secrets can be predicted or determined. In modern cryptography random sequences are used (1) to generate session...
متن کاملGeneric Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
LaMacchia, Lauter and Mityagin presented a strong security model for authenticated key agreement, namely the eCK model. They also constructed a protocol, namely the NAXOS protocol, that enjoys a simple security proof in the eCK model. However, the NAXOS protocol uses a random-oracle-based technique to combine the long-term secret key and the per-session-randomness; so-called NAXOStrick, in orde...
متن کاملTrue Random Number Generator Embedded in Reconfigurable Hardware
This paper presents a new True Random Number Generator (TRNG) based on an analog Phase-Locked Loop (PLL) implemented in a digital Altera Field Programmable Logic Device (FPLD). Starting with an analysis of the one available on chip source of randomness the PLL synthesized low jitter clock signal, a new simple and reliable method of true randomness extraction is proposed. Basic assumptions about...
متن کاملEdon - library of reconfigurable cryptographic primitives suitable for embedded systems
In this paper we describe several programming modules which perform string transformations with quasigroups. The modules use one or two quasigroups of order 16, thus, taking only 128 bytes for storage per quasigroup. Using those modules as cryptographic primitives we develop a block cipher, a stream cipher, a hash function with variable length of output that is strongly collision free and a pse...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 18 شماره
صفحات -
تاریخ انتشار 2016